You are on page 1of 2

TE

R OF SCIE

GILL SANS REGULAR

AS

NC

SE

ET

HI

E RT I F I E C D

C AL

H AC K

IN

ET

HI

C AL

H AC K

IN

CFIP I S UTER FOREN C SHands-On Ethical Hacking: AC M


FORENSI

CE

CER

ERTIFIED FO C

EC

UR

RT I F I E D

TIFIED

ITY

TES

TI

TESTIN TY G RI

SIC EN

INVESTIGATIO N

AC PR

MP

IN

CE

CMFS Providing a comprehensive grounding O in the methodology, IC MP NS U E T R E R Fethical O techniques and culture of hacking S TRY DATA S EC DU U
TY

C E RT I F I E D

RT I F I E D

S RA

TR

UCTURE

SE

C
U

L PP

IC A

TION SE C

U
RI

IN

AYM ENT C P AR D

C AL H A C K reinforce theor y On this course, practical exercises

ET

HI

IN

with each delegate having access to a Windows 2008 domain (server and workstation) along with a Linux ser ver. Although the course demonstrates current hacking techniques, this is always done with defence in mind and countermeasures are discussed throughout. The CSTA exam (theory based) is included at the end of the course. The course is ideally suited to anyone with responsibility for, or with an interest in, the security of IT systems, such as: system administrators, auditors, IT security officers, information security professionals and budding penetration testers.

Prerequisites
C

ERTIFIED I SO C

IN CSTA takes delegates on I C aA Ljourney H AC K through the various stages of a hacking S S S E CU ELE RI I R a penetration attack, or equally test, T W from initial information discover y and target scanning through to exploitation, privilege escalation and retaining access.CWSA
C AL

ET

HI

IN H AC K

ET

To Book Call:
ME IMPLE NTATIO N
TITIONER AC PR

C
TY
SI

0000 0000 0000 0000


PCI DSS

C E RT I F I E

0870 600 1667


IM

PL

E M E N TAT I O

01 Duration: 4 days 70 Cost: 1850.00 +VAT

O Y A basic understanding of TCP/IP M I T networking, e.g.

CIIP

TER SEC  Can you describe at a high-level how a request

PU

UR

reaches a web server through Ethernet, IP and TCP? What function does ARP perform?  How does a system know whether or not a gateway is required? What is a TCP por t?  Whats the difference between a command and its switches? Can you navigate the file system using commands?  Can you extract and display basic network configuration information, etc? Familiarity with the Windows or Linux command line, e.g.

SE

CU

RITY AN

SE

SE

ERTIFIED FO C

EC

RT I F I E D

RT I F I E D

TIFIED

TIFIED

Together with CSTP helps prepare you for the CREST Registered Tester qualification
CE

OMPUT C E

TE

R OF SCIE
G

GILL SANS REGULAR

AS

NC

EC

Y RIT

TES

TI

TESTIN ITY

CPE Credits: 32
G

UR

ITY

TES

TI

RI

TY

MSc Credits: 15
PR
OF
ESSIONAL

TESTIN

SIC EN

INVESTIGATIO N

PANTONE 1807

Black

PANTONE 424

ET

C E RT I F I E D

C E RT I F I E D

RT I F I E D

3.0.1

7Safe Cambridge, South Cambridge Business Park, Sawston, Cambridge, CB22 3JH, United Kingdom London Cambridge t 0870 600 1667 f 0870 600 1668 www.7safe.com CMFS O
SP
E RT I F I E C D

HI

C AL

H AC K

IN

ET

HI

C AL

H AC K

IN

ET

HI

C AL

H AC K

IN

ET

HI

C AL

H AC K

IN

AC

FORENSIC

MP

UTER FOREN

PP

LIC

AT I O N S E

CU

IN

RA

ST

RU C T URE S EC

PP

LIC

AT I O N S E

CU

MP

CE

UTER FOREN

SIC

IN

DU

S TRY DATA S EC U
RI

C
T

CFIP

CER

CER

CE

G
AS
S O C I AT E

PR
OF
ESSIONAL

RI

SP

EC

IALIST

TY

TESTER

TESTER

RI

STA

AN

A LY S T

FO
RE
NSICS

TIT AC PR

G
AS
S O C I AT E

PR

OF

AS

ESSIONAL

S O C I AT E

EC

IALIST

RI

RI

TY

TY

RI

TY

TESTER

TESTER

TESTER

Course Content
A full list of practical exercises is available on our website: www.7safe.com/csta Introduction Motivations behind hacking The hacking scene Methodology Sniffing traffic

Attacking Linux Exploitation Web shells Pivoting the attack Online password cracking ARP Poisoning Man in the Middle Standard streams

Privilege Escalation Linux

Networking Refresher

GILL SANS REGULAR Privilege escalation by exploit


Commercial penetration testing tools Password storage Password cracking Permission errors Sudo SUID Flawed shell scripts Backdoors websites, metadata, search

Information Discovery Useful information  Sources engines, DNS, social engineering Target Scanning Host discovery Banner grabbing Por t scanning techniques

Vulnerability Assessment

Causes of vulnerabilities The classic buffer overflow Vulnerability tracking Scanning Client-side vulnerabilities Windows enumeration Metasploit Client-side exploits Local information gathering Metasploits Meterpreter Keyloggers Password storage Password extraction Password cracking techniques Cached Domain Credentials Access tokens Pass the hash Windows network authentication

C E

R U

ITY

TES

Retaining Access

TI

G
AS

Trojan Horses Botnets

Delivery mechanisms Bypassing client-side security Hiding backdoors Simple obfuscation Rootkits Anti-forensics Log manipulation Connection laundering

RT I F I E D E C

Covering Tracks

S O C I AT E

Attacking Windows

Privilege Escalation Windows

Conclusions CSTA Exam

ET

HI

C AL

H AC

G N KI

RU C T URE

7Safe Cambridge, South Cambridge Business Park, Sawston, Cambridge, CB22 3JH, United Kingdom London Cambridge t 0870 600 1667 f 0870 600 1668 www.7safe.com

You might also like